Access your Pro+ Content below.

How to build a storage security strategy for your enterprise

Talk with any IT person these days and you'll hear that security concerns are on the top of their mind. Many of these folks were burned back in January by SQL Slammer, which affected 200,000 systems, did over $1 billion in damages, impacted major corporations such as Bank of America, Continental Airlines and Microsoft and ruined a lot of weekend plans. Severe problems like these lead to action. According to a Morgan Stanley survey of 225 CIOs conducted in December 2002, security spending tops their 10 highest priorities for 2003. In spite of the continued slow economy, security is one area where spending is real and sector growth is inevitable. IT departments at enterprises and midmarket companies are spending money on traditional desktop, perimeter and network security infrastructures with the top five areas being anti-spam, antivirus, intrusion-detection systems (IDS) and firewalls. What about storage? Although storage security hasn't made Morgan Stanley's top 10 list yet, there's a cottage industry of vendors addressing this ...

Cisco's new virtual SAN technology has aroused a lot of interest. But how does it work in practice? We look at how Australia's Deakin University uses VSANs to isolate development activity within its large, multisite fabric.

There's a growing interest in using IP for storage in small to midsized enterprises, although Fibre Channel is still dominant in large organizations. What's right for you: IP, FC or a combination of both?

Columns
in this issue

According to a Morgan Stanley December 2002 survey of 225 CIOs, security spending tops their 10 highest priorities for 2003. This article details how to build a thorough, companywide security strategy.